The new Gnome Terminal does not enable the dark theme automatically by itself, you need to explicitly enable it using the “Use dark theme variant” option. Its documented in the official Gnome help, but in there “Profile Preference” is mentioned, which is wrong! In Gnome 3.12 that option is under “Edit => Preference”!
Monthly Archives: April 2014
EXSYS USB-to-serial Adapter and stable device names
EXSYS provides multi serial-port adapters connected over USB. I recently ordered the 8-port device EX-1338HMV. From a hardware perspective, the device is made very solid, ready for industrial use. The connectors, USB as well as power, are secured by additional screws, so tensions on the cables should be an issue.
As soon as I connected the USB cable, the serial ports worked without using any external power adapter, however depending how much the connected device actually draw, external power might be needed.
The device has FTDI chips inside, which was the reason I opted for this solution. FTDI chips have a good reputation in providing high quality USB-to-serial adapters with high accuracy. The FTDI chips are connected through two internal USB hubs, as can be shown using lsusb:
/: Bus 03.Port 1: Dev 1,, Driver=xhci_hcd/4p, 480M |__ Port 1: Dev 14, If 0,, Driver=hub/7p, 480M |__ Port 1: Dev 15, If 0, Specific Class, Driver=ftdi_sio, 12M |__ Port 2: Dev 16, If 0, Specific Class, Driver=ftdi_sio, 12M |__ Port 3: Dev 17, If 0, Specific Class, Driver=ftdi_sio, 12M |__ Port 4: Dev 18, If 0, Specific Class, Driver=ftdi_sio, 12M |__ Port 5: Dev 19, If 0, Specific Class, Driver=ftdi_sio, 12M |__ Port 6: Dev 20, If 0, Specific Class, Driver=ftdi_sio, 12M |__ Port 7: Dev 21, If 0,, Driver=hub/4p, 480M |__ Port 1: Dev 22, If 0, Specific Class, Driver=ftdi_sio, 12M |__ Port 2: Dev 23, If 0, Specific Class, Driver=ftdi_sio, 12M
Heartbleed test for OpenVPN
I guess you would not have landed here if you don’t read about Heartbleed. In case you really don’t know what its all about, catch up here. Since OpenVPN makes use of SSL/TLS (and most distributions use OpenSSL as the implementation of choice), OpenVPN is affected too (check the official page). Most test utilities out there can test HTTP and other protocols, however, I didn’t found a test which validates that a OpenVPN installation is safe. So I created one.
You can find the Python script over at Github. My version is an heavily altered version I found at Fox-It created by Jared Stafford and Yonathan Klijnsma.
Right now, the utility only supports UDP (which is used by default). The first arguments need to be the test server which then will be contacted and a TLS session initialized. The script then sends a invalid heartbeat request, which the server will respond to if he is vulnerable.
$ ./heartbleed_test_openvpn.py my.server.com my.server.com|VULNERABLE 0000 18 03 01 10 13 02 10 00 48 65 61 72 74 62 6C 65 ........Heartble 0010 65 64 20 74 65 73 74 20 70 61 79 6C 6F 61 64 E2 ed test payload. 0020 0B 9E 38 34 EC 3D 66 2B 9C D5 63 00 00 68 C0 14 ..84.=f+..c..h.. 0030 C0 0A 22 C0 C0 21 00 39 00 38 00 88 00 87 C0 0F ...".!.9.8...... 0040 C0 05 00 35 00 84 C0 21 C4 08 1C 1C C0 1B 00 16 ...5............ 0050 00 13 C0 0D C0 03 00 0A C0 13 C0 09 C0 1F C0 1E ................ 0060 00 00 00 32 ...2